IDENTITY ASSURANCE PRINCIPLES

Size: px
Start display at page:

Download "IDENTITY ASSURANCE PRINCIPLES"

Transcription

1 IDENTITY ASSURANCE PRINCIPLES PRIVACY AND CONSUMER ADVISORY GROUP (PCAG) V th July 2014

2 CONTENTS 1. Introduction 3 2. The Context of the Principles 4 3. Definitions 6 4. The Nine Identity Assurance Principles User Control Transparency Multiplicity Data Minimisation Data Quality Service User Access and Portability Certification Dispute Resolution Exceptional Circumstances 11 2

3 1. INTRODUCTION 1.1 These Principles have been developed to support an Identity Assurance Service that allows individual users to control when to reveal their own identifying information. This focus on individual control and consent is far removed from old- fashioned notions of imposing central identity solutions and databases, supported by mandatory disclosure and compulsion. The intention is instead to bring about a secure Identity Assurance Service that is attractive to citizens and allows them to control a number of identity credentials, chosen by them, which can be voluntarily used with different online Service Providers. 1.2 Public trust in an Identity Assurance Service will enable various benefits to follow: Service Providers will be less worried about identity fraud and impersonation since claims based on the use of fraudulent identities become nearly impossible. At the same time, the individuals are reassured that their identity is secure and any transaction is safely delivered to the right destination. This is a collaborative win- win outcome for both the individual and the government: everybody benefits. 1.3 To deliver these objectives there has to be a framework that gives real meaning to terms such as individual privacy and individual control. Such a framework is set out in the nine Identity Assurance Principles contained in this document: these Principles have been developed by the independent Privacy and Consumer Advisory Group (PCAG), including open public consultation on earlier working drafts. 1.4 These Principles are designed around the needs of the individual and not on the needs of any state body or commercial corporation. In order to demonstrate that these Principles serve the interest of the individual, below are one- sentence summaries, expressed in the first person, which define the intended effect of each Principle. Identity Assurance Principle Summary of the control afforded to an individual 1. User Control I can exercise control over identity assurance activities affecting me and these can only take place if I consent or approve them 2. Transparency Identity assurance can only take place in ways I understand and when I am fully informed 3. Multiplicity I can use and choose as many different identifiers or identity providers as I want to 4. Data Minimisation My interactions only use the minimum data necessary to meet my needs 5. Data Quality I choose when to update my records 6. Service User Access and Portability I have to be provided with copies of all of my data on request; I can move / remove my data whenever I want 7. Certification I can have confidence in the Identity Assurance Service because all the participants have to be certified against common governance requirements 8. Dispute Resolution If I have a dispute, I can go to an independent Third Party for a resolution 9. Exceptional Circumstances I know that any exception has to be approved by Parliament and is subject to independent scrutiny 3

4 2. THE CONTEXT OF THE PRINCIPLES 2.1 These Principles have been produced by the Privacy and Consumer Advisory Group, but are not devoted solely to privacy, data protection or consumer issues. These Principles apply to the operation of a user- centric, Identity Assurance Service that places the individual Service User (i.e. the person who has registered the identity, or someone authorised to act on their behalf) in control of when and how they assert their identity. 2.2 The Principles are equal to each other and do not overlap. Each Principle has a specific role and, in combination, they are all necessary to engender trust in the Identity Assurance Service. 2.3 These Principles are limited in their application to the processing of data in an Identity Assurance Service (e.g. establishing and verifying identity of a Service User; conducting a transaction that uses an identity; maintaining audit requirements in relation to a transaction associated with the use of a service that needs identity verification etc.). They do not apply to other data (e.g. data that are used to deliver a service, or to measure its quality). 2.4 The nine Principles assume that an Identity Assurance Service is mature and well established. We acknowledge however that in the early stages of its development there may well be a phasing- in period in relation to each Principle, or that in some cases a Principle might need a degree of initial flexibility. However, we believe that within a reasonable time frame, all of these Principles should be fully implemented by the Identity Assurance Service. 2.5 We recognise that special interests (e.g. law enforcement) may need exemptions and this is the purpose of the ninth Principle. Such special interests should be subject to a simple rule: exemptions have to be explicitly defined and publicly reported. The Group recommends that this should ideally be enabled through legislation to establish the Identity Assurance Service infrastructure coupled with robust contractual terms that enforce all of the Principles. We do not think it advisable to allow existing legislation to define access to any data from the Identity Assurance Service since such legislation, when it was originally enacted, could not have been scrutinised in the context of an Identity Assurance Service. Any exemption from these Principles needs public scrutiny in order to gain credibility and maintain trust. However, in the absence of specific legislation establishing the Identity Assurance Service, it is essential that other mechanisms be implemented to ensure transparency, scrutiny and, where necessary, debate. As these Principles only apply to Identity Assurance Data used by the Identify Assurance Service, they have no impact on any operational matter of any law enforcement agency, except where the operational matter relates to obtaining such data from an Identity Assurance Service. In such cases, the Exceptional Circumstances Principle will apply. 2.6 The wording of each Principle has been carefully chosen to balance any competing claims. They have been widely debated within the Privacy and Consumer Advisory Group and through the associated open consultation process, so we request that any changes to the text of any Principle be supported by the detail of any problem that has been encountered. We intend to review the Principles at least annually in the light of experience and any comments received. 4

5 2.7 Where appropriate, we expect that the application of these Identity Assurance Principles will be described: in public documents that explain the operation of the Identity Assurance Service in presentations about the Identity Assurance Service in procurement processes, technical design and associated procedures of the Identity Assurance Service 2.8 The Principles are limited to their application to the Identity Assurance Service in the UK, with a particular emphasis on the UK Government s objective to deliver public services electronically. We note, however, that these Principles could have international reach, especially in the USA, or in the European Union, OECD and APEC countries. However, our starting assumption has been that such interchangeability with any other nationally- based Principles will only become relevant when the UK Principles have established a proven track record in gaining the confidence of individuals who use a Service. However, we believe that these Principles are fully consistent with all national and international data protection requirements and the obligations arising from the UK s common law of confidence. 2.9 The Principles are drafted in a way that allows for a degree of precision. They are not drafted in a way that defines statutory Principles, but the text could form the basis of a Statutory Code of Practice, similar, for example to the model provided by the Statutory Code of Practice on Data Sharing. A Statutory Code of Practice would cover all types of organisation, of any size and in any usage context, which might wish to provide or consume any services from the Identity Assurance Service These Principles represent good practice guidance and the requirements of other legal duties under human rights and data protection legislation and the common law. The Principles apply to all identity assurance activities described in Good Practice Guide (GPG) 43 Requirements for Secure Delivery of Online Public Services. The architecture of the Identity Assurance Service must be based on open standards. 5

6 3. DEFINITIONS 3.1 These Principles are limited to the processing of Identity Assurance Data (IdA Data) in an Identity Assurance Service (e.g. establishing and verifying identity of a Service User; conducting a transaction that uses a user identity; maintaining audit requirements in relation a transaction associated with the use of a service that needs identity verification etc.). They do not cover, for example, any data used to deliver a service, or to measure its quality (see para 2.3). 3.2 In the context of the application of the Identity Assurance Principles to an Identity Assurance Service, Identity Assurance Data (IdA Data) means any recorded information that is connected with a Service User including: Audit Data. This includes any recorded information that is connected with any log or audit associated with an Identity Assurance Service General Data. This means any other recorded information which is not personal data, audit data or relationship data, but is still connected with a Service User Personal Data. This takes its meaning from the Data Protection Act or subsequent legislation (e.g. any recorded information that relates to a Service User who is also an identifiable living individual) Relationship Data. This means any recorded information that describes (or infers) a relationship between a Service User, Identity Provider or Service Provider with another Service User, Identity Provider or Service Provider and includes any cookie or program whose purpose is to supply a means through which relationship data are collected 3.3 Other terms used in the Principles are defined as follows: Identity Assurance Service. This includes relevant applications of the technology (e.g. hardware, software, database, documentation) in the possession or control of any Service User, Identity Provider or Service Provider that is used to facilitate identity assurance activities; it also includes any IdA Data processed by that technology or by an Identity Provider or by a Service Provider in the context of the Service; and any IdA Data processed by the underlying infrastructure for the purpose of delivering the IdA service or associated billing, management, audit and fraud prevention Identity Provider. This means the certified individual or certified organisation that provides an Identity Assurance Service (e.g. establishing an identity, verification of identity); it includes any agent of a certified Identity Provider that processes IdA data in connection with that Identity Assurance Service Participant. This means any Identity Provider, Service Provider or Service User in an Identity Assurance Service. A Participant includes any agent by definition Processing. In the context of IdA data means collecting, using, disclosing, retaining, transmitting, copying, comparing, corroborating, correlating, aggregating, accessing the data and includes any other operation performed on IdA data Provider. Includes both Identity Provider and/or Service Provider 6

7 Service Provider. This means the certified individual or certified organisation that provides a service that uses an Identity Provider in order to verify identity of the Service User; it includes any agent of the Service Provider that processes IdA data from an Identity Assurance Service Service User. This means the person (i.e. an organisation (incorporated or not) or an individual (dead or alive) who has established (or is establishing) an identity with an Identity Provider; it includes an agent (e.g. a solicitor, family member) who acts on behalf of a Service User with proper authority (e.g. a public guardian, or a Director of a company, or someone who possesses power of attorney). The person may be living or deceased (the identity may still need to be used once its owner is dead, for example by an executor) Third Party. This means any person (i.e. any organisation or individual) who is not a Participant (e.g. the police or a Regulator). Note: we think it helpful to create a link to the language from the National Strategy for Trusted Identities in Cyberspace (NSTIC) which defines participants as the collective subjects, identity providers, attribute providers, relying parties, and identity media taking part in a given transaction. This way, Third Parties are not Participants 7

8 4. THE NINE IDENTITY ASSURANCE PRINCIPLES Any exemptions from these Principles must be specified via the Exceptional Circumstances Principle. 4.1 USER CONTROL I can exercise control over identity assurance activities affecting me and these can only take place if I consent or approve them An Identity Provider or Service Provider must ensure any collection, use or disclosure of IdA data in, or from, an Identity Assurance Service is approved by each particular Service User who is connected with the IdA data There should be no compulsion to use the Identity Assurance Service and Service Providers should offer alternative mechanisms to access their services. Failing to do so would undermine the consensual nature of the service. 4.2 TRANSPARENCY Identity assurance can only take place in ways I understand and when I am fully informed Each Identity Provider or Service Provider must be able to justify to Service Users why their IdA data are processed. Ensuring transparency of activity and effective oversight through auditing and other activities inspires public trust and confidence in how their details are used Each Service User must be offered a clear description about the processing of IdA data in advance of any processing. Identity Providers must be transparent with users about their particular models for service provision The information provided includes a clear explanation of why any specific information has to be provided by the Service User (e.g. in order that a particular level of identity assurance can be obtained) and identifies any obligation on the part of the Service User (e.g. in relation to the User s role in securing his / her own identity information) The Service User will be able to identify which Service Provider they are using at any given time Any subsequent and significant change to the processing arrangements that have been previously described to a Service User requires the prior consent or approval of that Service User before it comes into effect All procedures, including those involved with security, should be should be made publicly available at the appropriate time, unless such transparency presents a security or privacy risk. For example, the standards of encryption can be identified without jeopardy to the encryption keys being used. 8

9 4.3 MULTIPLICITY I can use and choose as many different identifiers or identity providers as I want to A Service User is free to use any number of identifiers that each uniquely identifies the individual or business concerned A Service User can use any of his identities established with an Identity Provider with any Service Provider A Service User shall not be obliged to use any Identity Provider or Service Provider not chosen by that Service User; however, a Service Provider can require the Service User to provide a specific level of Identity Assurance, appropriate to the Service User s request to a Service Provider A Service User can choose any number of Identity Providers and where possible can choose between Service Providers in order to meet his or her diverse needs. Where a Service User chooses to register with more than one Identity Provider, Identity Providers and Service Providers must not link the Service User s different accounts or gain information about their use of other Providers A Service User can terminate, suspend or change Identity Provider and where possible can choose between Service Providers at any time A Service Provider does not know the identity of the Identity Provider used by a Service User to verify an identity in relation to a specific service. The Service Provider knows that the Identity Provider can be trusted because the Identity Provider has been certified, as set out in GPG43 Requirements for Secure Delivery of Online Public Services (RSDOPS). 4.4 DATA MINIMISATION My interactions only use the minimum data necessary to meet my needs Identity Assurance should only be used where a need has been established and only to the appropriate minimum level of assurance Identity Assurance data processed by an Identity Provider or a Service Provider to facilitate a request of a Service User must be the minimum necessary in order to fulfil that request in a secure and auditable manner When a Service User stops using a particular Identity Provider, their data should be deleted. Data should be retained only where required for specific targeted fraud, security or other criminal investigation purposes. 4.5 DATA QUALITY I choose when to update my records Service Providers should enable Service Users (or authorised persons, such as the holder of a Power of Attorney) to be able to update their own personal data, at a time at their choosing, free of charge and in a simple and easy manner. 9

10 4.5.2 Identity Providers and Service Providers must take account of the appropriate level of identity assurance required before allowing any updating of personal data. 4.6 SERVICE USER ACCESS AND PORTABILITY I have to be provided with copies of all of my data on request; I can move / remove my data whenever I want Each Identity Provider or Service Provider must allow, promptly, on request and free of charge, each Service User access to any IdA data that relates to that Service User It shall be unlawful to make it a condition of doing anything in relation to a Service User to request or require that Service User to request IdA data The Service User must be able to require an Identity Provider to transfer his personal data, to a second Identity Provider in a standard electronic format, free of charge and without impediment or delay. 4.7 CERTIFICATION I can have confidence in the Identity Assurance Service because all the participants have to be certified against common governance requirements As a baseline control, all Identity Providers and Service Providers will be certified against a shared standard. This is one important way of building trust and confidence in the service As part of the certification process, Identity Providers and Service Providers are obliged to co- operate with the independent Third Party and accept their impartial determination and to ensure that contractual arrangements: reinforce the application of the Identity Assurance Principles contain a reference to the independent Third Party as a mechanism for dispute resolution There will be a certification procedure subject to an effective independent audit regime that ensures all relevant, recognised identity assurance and technical standards, data protection or other legal requirements, are maintained by Identity Providers and Service Providers In the context of personal data, certification procedures include the use of Privacy Impact Assessments, Security Risk Assessments, Privacy by Design concepts and, in the context of information security, a commitment to using appropriate technical measures (e.g. encryption) and ever improving security management. Wherever possible, such certification processes and security procedures reliant on technical devices should be made publicly available at the appropriate time All Identity Providers and Service Providers will take all reasonable steps to ensure that a Third Party cannot capture IdA data that confirms (or infers) the existence of relationship between any Participant. No relationships between parties or records should be established without the consent of the Service User. 10

11 4.7.6 Certification can be revoked if there is significant non- compliance with any Identity Assurance Principle. 4.8 DISPUTE RESOLUTION If I have a dispute, I can go to an independent Third Party for a resolution A Service User who, after a reasonable time, cannot, or is unable, to resolve a complaint or problem directly with an Identity Provider or Service Provider can call upon an independent Third Party to seek resolution of the issue. This could happen for example where there is a disagreement between the Service User and the Identity Provider about the accuracy of data The independent Third Party can resolve the same or similar complaints affecting a group of Service Users The independent Third Party can co- operate with other regulators in order to resolve problems and can raise relevant issues of importance concerning the Identity Assurance Service An adjudication / recommendation of the independent Third Party should be published. The independent Third Party must operate transparently, but detailed case histories should only be published subject to appropriate review and consent There can be more than one independent Third Party The independent Third Party can recommend changes to standards or certification procedures or that an Identity Provider or Service Provider should lose their certification. 4.9 EXCEPTIONAL CIRCUMSTANCES Any exception has to be approved by Parliament and is subject to independent scrutiny Any exemption from the application of any of the above Principles to IdA data shall only be lawful if it is linked to a statutory framework that legitimises all Identity Assurance Services, or an Identity Assurance Service in the context of a specific service. In the absence of such a legal framework then alternative measures must be taken to ensure, transparency, scrutiny and accountability for any exceptions Any exemption from the application of any of the above Principles that relates to the processing of personal data must also be necessary and justifiable in terms of one of the criteria in Article 8(2) of the European Convention of Human Rights: namely in the interests of national security; public safety or the economic well- being of the country; for the prevention of disorder or crime; for the protection of health or morals, or for the protection of the rights and freedoms of others Any subsequent processing of personal data by any Third Party who has obtained such data in exceptional circumstances (as identified by Article 8(2) above) must be the minimum necessary to achieve that (or another) exceptional circumstance. 11

12 4.9.4 Any exceptional circumstance involving the processing of personal data must be subject to a Privacy Impact Assessment by all relevant data controllers (where data controller takes its meaning from the Data Protection Act) Any exemption from the application of any of the above Principles in relation to IdA data shall remain subject to the Dispute Resolution Principle. 12

Privacy Policy of

Privacy Policy of Privacy Policy of www.bitminutes.com This Application collects some Personal Data from its Users. Owner and Data Controller BitMinutes Inc Owner contact email: privacy@bitminutes.com Types of Data collected

More information

Our Data Protection Officer is Andrew Garrett, Operations Manager

Our Data Protection Officer is Andrew Garrett, Operations Manager Construction Youth Trust Privacy Notice We are committed to protecting your personal information Construction Youth Trust is committed to respecting and keeping safe any personal information you share

More information

PRIVACY POLICY OF THE WEB SITE

PRIVACY POLICY OF THE WEB SITE PRIVACY POLICY OF THE ERANOS FOUNDATION Introductory remarks The Eranos Foundation respects your privacy! Privacy policy EU Norm 2016-769 GDPR 1 We do not sell or distribute any information that we acquire

More information

Privacy Policy. Data Controller - the entity that determines the purposes, conditions and means of the processing of personal data

Privacy Policy. Data Controller - the entity that determines the purposes, conditions and means of the processing of personal data Privacy Policy Datacenter.com (referred to as we, us, our, Datacenter or the Company ) is committed to protecting your privacy and handling your data in an open and transparent manner. The personal data

More information

ARTICLE 29 DATA PROTECTION WORKING PARTY

ARTICLE 29 DATA PROTECTION WORKING PARTY ARTICLE 29 DATA PROTECTION WORKING PARTY 18/EN WP261 Article 29 Working Party Draft Guidelines on the accreditation of certification bodies under Regulation (EU) 2016/679 Adopted on 6 february 2018 1 THE

More information

We may change the privacy notice from time to time by amending this page.

We may change the privacy notice from time to time by amending this page. Holland & Odam Updated 4 th May 2018 This privacy notice sets out how we will process personal data we collect from or about you, or which you provide to us. Please read this notice carefully to understand

More information

ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION

ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION Document Control Owner: Distribution List: Data Protection Officer Relevant individuals who access, use, store or

More information

Guidelines 4/2018 on the accreditation of certification bodies under Article 43 of the General Data Protection Regulation (2016/679)

Guidelines 4/2018 on the accreditation of certification bodies under Article 43 of the General Data Protection Regulation (2016/679) Guidelines 4/2018 on the accreditation of certification bodies under Article 43 of the General Data Protection Regulation (2016/679) Adopted on 4 December 2018 Adopted 1 Contents 1 Introduction... 3 2

More information

Motorola Mobility Binding Corporate Rules (BCRs)

Motorola Mobility Binding Corporate Rules (BCRs) Motorola Mobility Binding Corporate Rules (BCRs) Introduction These Binding Privacy Rules ( Rules ) explain how the Motorola Mobility group ( Motorola Mobility ) respects the privacy rights of its customers,

More information

Data Protection. Code of Conduct for Cloud Infrastructure Service Providers

Data Protection. Code of Conduct for Cloud Infrastructure Service Providers Data Protection Code of Conduct for Cloud Infrastructure Service Providers 27 JANUARY 2017 Introduction... 3 1 Structure of the Code... 5 2 Purpose... 6 3 Scope... 7 4 Data Protection Requirements... 9

More information

We may change the privacy notice from time to time by amending this page.

We may change the privacy notice from time to time by amending this page. This privacy notice sets out how we will process personal data we collect from or about you, or which you provide to us. Please read this notice carefully to understand why data is being collected and

More information

In this policy, whenever you see the words we, us, our, it refers to Ashby Concert Band Registered Charity Number

In this policy, whenever you see the words we, us, our, it refers to Ashby Concert Band Registered Charity Number ASHBY CONCERT BAND PRIVACY POLICY The privacy and security of your personal information is extremely important to us. This privacy policy explains how and why we use your personal data. We will keep this

More information

GDPR Compliant. Privacy Policy. Updated 24/05/2018

GDPR Compliant. Privacy Policy. Updated 24/05/2018 GDPR Compliant Privacy Policy Updated 24/05/2018 Overview This privacy policy is in compliance with the General Data Protection Act which aims to empower all EU citizens data privacy and to reshape the

More information

Within the meanings of applicable data protection law (in particular EU Regulation 2016/679, the GDPR ):

Within the meanings of applicable data protection law (in particular EU Regulation 2016/679, the GDPR ): Privacy Policy Introduction Ikano S.A. ( Ikano ) respects your privacy and is committed to protect your Personal Data by being compliant with this privacy policy ( Policy ). In addition to Ikano, this

More information

DATA PRIVACY & PROTECTION POLICY POLICY INFORMATION WE COLLECT AND RECEIVE. Quality Management System

DATA PRIVACY & PROTECTION POLICY POLICY INFORMATION WE COLLECT AND RECEIVE. Quality Management System DATA PRIVACY & PROTECTION POLICY POLICY This Data Privacy & Protection Policy applies to ELMO Software Limited s Cloud HR & Payroll applications and platform (collectively, the Services ), elmosoftware.com.au

More information

PS Mailing Services Ltd Data Protection Policy May 2018

PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Limited is a registered data controller: ICO registration no. Z9106387 (www.ico.org.uk 1. Introduction 1.1. Background We collect

More information

Legal basis of processing. Place MODE AND PLACE OF PROCESSING THE DATA

Legal basis of processing. Place MODE AND PLACE OF PROCESSING THE DATA Privacy Policy of www.florence-apartments.net This Application collects some Personal Data from its Users. Owner and Data Controller Florence Apartments Sas - via Curtatone, 2-50123 Firenze Owner contact

More information

CURTIS BANKS LIMITED. Privacy Information Notice. curtisbanks.co.uk

CURTIS BANKS LIMITED. Privacy Information Notice. curtisbanks.co.uk CURTIS BANKS LIMITED Privacy Information Notice curtisbanks.co.uk Contents Section Page 1 Who we are 3 2 Why we need to collect, use and process personal information 3 3 The information we may collect,

More information

PRIVACY POLICY. What personal data we collect and why we collect it IN ORDER TO: (Date of last update: 1 st January 2019)

PRIVACY POLICY. What personal data we collect and why we collect it IN ORDER TO: (Date of last update: 1 st January 2019) PRIVACY POLICY (Date of last update: 1 st January 2019) For the purpose of the Data Protection Act 1998 (the Act) and from the 25 May 2018, the EU General Data Protection Regulation 2016/679 (the GDPR),

More information

Vistra International Expansion Limited PRIVACY NOTICE

Vistra International Expansion Limited PRIVACY NOTICE Effective Date: from 25 May 2018 Vistra International Expansion Limited PRIVACY NOTICE This Privacy Notice explains how particular companies in the Vistra Group collect, use and disclose your personal

More information

Data Preservation Checklists

Data Preservation Checklists Data Preservation Checklists At the G8 meeting of Justice and Interior Ministers in Moscow in October 1999, the Ministers recognized that law enforcement authorities conducting criminal investigations

More information

PRIVACY COMMITMENT. Information We Collect and How We Use It. Effective Date: July 2, 2018

PRIVACY COMMITMENT. Information We Collect and How We Use It. Effective Date: July 2, 2018 Effective Date: July 2, 2018 PRIVACY COMMITMENT Protecting your privacy is very important to Prosci and this privacy policy is our way of providing you with details about the types of information we collect

More information

Personal Data collected for the following purposes and using the following services:

Personal Data collected for the following purposes and using the following services: PRIVACY POLICY www.marquise-tech.com This Website collects some Personal Data from its Users. POLICY SUMMARY Personal Data collected for the following purposes and using the following services: Contacting

More information

Care Recruitment Matters Limited Privacy Notice

Care Recruitment Matters Limited Privacy Notice Care Recruitment Matters Limited Privacy Notice Care Recruitment Matters Limited (CRM) is a specialist recruitment agency, sourcing permanent candidates for companies focused in the Health and Social Care

More information

The West End Community Trust Privacy Policy

The West End Community Trust Privacy Policy The West End Community Trust Privacy Policy We are committed to protecting your personal information and being transparent about what we do with it, however you interact with us. We are therefore committed

More information

Our Privacy Statement

Our Privacy Statement Our Privacy Statement This Privacy Statement tells you about the information Elizabeth McGuinness & Co Solicitors collect from you when you use our website. In collecting this information, we are acting

More information

Important Information

Important Information Important Information Important Information Effective from 13 January 2018 1. Your information 1.1 Who we are We are Coutts & Co, of 440 Strand, London WC2R OQS. We are a member of The Royal Bank of Scotland

More information

Data Subject Access Request

Data Subject Access Request Data Subject Access Request DATA PROTECTION ACT 1998 Version: 10.0 Approval Status: Approved Document Owner: Graham Feek Classification: Internal Review Date: 03/07/2017 Effective from: 1 July 2015 Table

More information

NWQ Capital Management Pty Ltd. Privacy Policy. March 2017 v2

NWQ Capital Management Pty Ltd. Privacy Policy. March 2017 v2 NWQ Capital Management Pty Ltd Privacy Policy March 2017 Page 1 of 8 Privacy and Spam Policy NWQ Capital Management Pty Ltd s Commitment NWQ Capital Management Pty Ltd (NWQ) is committed to providing you

More information

PRIVACY STATEMENT +41 (0) Rue du Rhone , Martigny, Switzerland.

PRIVACY STATEMENT +41 (0) Rue du Rhone , Martigny, Switzerland. PRIVACY STATEMENT +41 (0) 225349799 www.energymarketprice.com Rue du Rhone 5 1921, Martigny, Switzerland dpo@energymarketprice.com Introduction Your privacy and trust are important to us and this Privacy

More information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.

More information

Privacy Policy May 2018

Privacy Policy May 2018 Privacy Policy May 2018 Laser Surveys Ltd T/A Open Space Rooms Laser Surveys operates a privacy first approach to all our business activities and will only require the minimum information to perform our

More information

Digital Signatures Act 1

Digital Signatures Act 1 Issuer: Riigikogu Type: act In force from: 01.07.2014 In force until: 25.10.2016 Translation published: 08.07.2014 Digital Signatures Act 1 Amended by the following acts Passed 08.03.2000 RT I 2000, 26,

More information

Submission to the International Integrated Reporting Council regarding the Consultation Draft of the International Integrated Reporting Framework

Submission to the International Integrated Reporting Council regarding the Consultation Draft of the International Integrated Reporting Framework Submission to the International Integrated Reporting Council regarding the Consultation Draft of the International Integrated Reporting Framework JULY 2013 Business Council of Australia July 2013 1 About

More information

We may change the privacy notice from time to time by amending this page. What type of information will we collect from you?

We may change the privacy notice from time to time by amending this page. What type of information will we collect from you? This privacy notice sets out how we will process personal data we collect from or about you, or which you provide to us. Please read this notice carefully to understand why data is being collected and

More information

Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2

Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2 Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2 Privacy Policy knows that your privacy is important to you. Below is our privacy policy for collecting, using, securing, protecting and sharing your

More information

Rights of Individuals under the General Data Protection Regulation

Rights of Individuals under the General Data Protection Regulation Rights of Individuals under the General Data Protection Regulation 2018 Contents Introduction... 2 Glossary... 3 Personal data... 3 Processing... 3 Data Protection Commission... 3 Data Controller... 3

More information

HPE DATA PRIVACY AND SECURITY

HPE DATA PRIVACY AND SECURITY ARUBA, a Hewlett Packard Enterprise company, product services ( Services ) This Data Privacy and Security Agreement ("DPSA") Schedule governs the privacy and security of Personal Data by HPE in connection

More information

When you submit material to the Lest We Forget project you are accepting and consenting to the practices described in this policy.

When you submit material to the Lest We Forget project you are accepting and consenting to the practices described in this policy. Privacy policy Lest We Forget https://lwf.web.ox.ac.uk/home ( Lest We Forget ) and http://lwf.it.ox.ac.uk/s/lest-weforget/page/welcome [ Lest We Forget: Submission Site are operated by the University of

More information

Islam21c.com Data Protection and Privacy Policy

Islam21c.com Data Protection and Privacy Policy Islam21c.com Data Protection and Privacy Policy Purpose of this policy The purpose of this policy is to communicate to staff, volunteers, donors, non-donors, supporters and clients of Islam21c the approach

More information

1.7 The Policy sets out the manner by which the University will respond to Subject Access Requests.

1.7 The Policy sets out the manner by which the University will respond to Subject Access Requests. 1 Introduction 1.1 Article 15 of the General Data Protection Regulations (GDPR) provides individuals (Data Subjects) with the right to access personal information so that they are fully informed of the

More information

General Data Protection Regulation BT s amendments to the proposed Regulation on the protection of individuals with regard to the processing of

General Data Protection Regulation BT s amendments to the proposed Regulation on the protection of individuals with regard to the processing of General Data Protection Regulation BT s amendments to the proposed Regulation on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General

More information

This Privacy Policy applies if you're a customer, employee or use any of our services, visit our website, , call or write to us.

This Privacy Policy applies if you're a customer, employee or use any of our services, visit our website,  , call or write to us. Privacy Policy Background This policy explains when and why we collect personal information about you; how we use it, the conditions under which we may disclose it to others and how we keep it secure.

More information

What is cloud computing? The enterprise is liable as data controller. Various forms of cloud computing. Data controller

What is cloud computing? The enterprise is liable as data controller. Various forms of cloud computing. Data controller A guide to CLOUD COMPUTING 2014 Cloud computing Businesses that make use of cloud computing are legally liable, and must ensure that personal data is processed in accordance with the relevant legislation

More information

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights Secure Messaging Mobile App Privacy Policy Privacy Policy Highlights For ease of review, Everbridge provides these Privacy Policy highlights, which cover certain aspects of our Privacy Policy. Please review

More information

CHASE GRAMMAR SCHOOL PRIVACY STATEMENT General Data Protection Regulations (GDPR)

CHASE GRAMMAR SCHOOL PRIVACY STATEMENT General Data Protection Regulations (GDPR) CHASE GRAMMAR SCHOOL PRIVACY STATEMENT General Data Protection Regulations (GDPR) The GDPR is the biggest change to data privacy laws in the last 20 years and comes into effect on 25 May 2018. The new

More information

Online Ad-hoc Privacy Notice

Online Ad-hoc Privacy Notice Online Ad-hoc Privacy Notice Last revised: 24 May 2018 Table of contents 1 About us and our Surveys... 2 2 What is personal data?... 2 3 Use of personal data... 2 3.1 Categories of personal data that are

More information

VISTRA (CYPRUS) LTD. PRIVACY NOTICE

VISTRA (CYPRUS) LTD. PRIVACY NOTICE Effective Date: from 25 May 2018 VISTRA (CYPRUS) LTD. PRIVACY NOTICE This Privacy Notice explains how particular companies in the Vistra Group collect, use and disclose your personal data, and your rights

More information

It s still very important that you take some steps to help keep up security when you re online:

It s still very important that you take some steps to help keep up security when you re online: PRIVACY & SECURITY The protection and privacy of your personal information is a priority to us. Privacy & Security The protection and privacy of your personal information is a priority to us. This means

More information

SAFE-BioPharma RAS Privacy Policy

SAFE-BioPharma RAS Privacy Policy SAFE-BioPharma RAS Privacy Policy This statement discloses the privacy practices for the SAFE-BioPharma Association ( SAFE- BioPharma ) Registration Authority System ( RAS ) web site and describes: what

More information

DISCLOSURE ON THE PROCESSING OF PERSONAL DATA LAST REVISION DATE: 25 MAY 2018

DISCLOSURE ON THE PROCESSING OF PERSONAL DATA LAST REVISION DATE: 25 MAY 2018 DISCLOSURE ON THE PROCESSING OF PERSONAL DATA LAST REVISION DATE: 25 MAY 2018 Introduction This disclosure on the processing of personal data (hereinafter, the "Disclosure") is provided pursuant to Art.

More information

DEPARTMENT OF JUSTICE AND EQUALITY. Data Protection Policy

DEPARTMENT OF JUSTICE AND EQUALITY. Data Protection Policy DEPARTMENT OF JUSTICE AND EQUALITY Data Protection Policy May 2018 Contents Page 1. Introduction 3 2. Scope 3 3. Data Protection Principles 4 4. GDPR - Rights of data subjects 6 5. Responsibilities of

More information

NAI Mobile Application Code

NAI Mobile Application Code 2013 NAI Mobile Application Code Introduction The NAI Mobile Application Code, like the 2013 NAI Code of Conduct, governs only NAI member companies. It does not govern all data collection by member companies,

More information

Universal Robots A/S, Energivej 25, 5220 Odense, Denmark

Universal Robots A/S, Energivej 25, 5220 Odense, Denmark Privacy Policy of Universal Robots Privacy Policy applies for This Privacy Policy applies for the Personal Data Universal Robots collects about individuals, customers,, suppliers (including third party

More information

SHELTERMANAGER LTD CUSTOMER DATA PROCESSING AGREEMENT

SHELTERMANAGER LTD CUSTOMER DATA PROCESSING AGREEMENT SHELTERMANAGER LTD CUSTOMER DATA PROCESSING AGREEMENT AGREEMENT DATED [ ] BETWEEN: (1) SHELTERMANAGER LTD and (2) [ ] ( The Customer ) BACKGROUND (A) (B) (C) This Agreement is to ensure there is in place

More information

UWTSD Group Data Protection Policy

UWTSD Group Data Protection Policy UWTSD Group Data Protection Policy Contents Clause Page 1. Policy statement... 1 2. About this policy... 1 3. Definition of data protection terms... 1 4. Data protection principles..3 5. Fair and lawful

More information

Privacy Notices under #GDPR: Have you noticed my notice?

Privacy Notices under #GDPR: Have you noticed my notice? Privacy Notices under #GDPR: Have you noticed my notice? As you all know by now the General Data Protection Regulation (GDPR) is here and it is (as predicted) starting to get various people fired up ready

More information

ISSUES FOR RESPONSIBLE USER-CENTRIC IDENTITY

ISSUES FOR RESPONSIBLE USER-CENTRIC IDENTITY ISSUES FOR RESPONSIBLE USER-CENTRIC IDENTITY November 2009 Version 1.0 In light of the announcement of a series of federal pilots for federated identity providers, we have analyzed the governance and policy

More information

One Sector Community Limited ACN ( OSC ) Privacy Policy

One Sector Community Limited ACN ( OSC ) Privacy Policy One Sector Community Limited ACN 623 427 323 ( OSC ) Privacy Policy General Collection OSC and its related entities (referred to in this document as we, us or our ) are committed to protecting the personal

More information

This website is managed by Club Systems International on behalf of the Hoburne and Burry and Knight Groups.

This website is managed by Club Systems International on behalf of the Hoburne and Burry and Knight Groups. Privacy Policy This website is managed by Club Systems International on behalf of the Hoburne and Burry and Knight Groups. Your privacy is important to us and this Privacy Policy ( Policy ) provides information

More information

Plus500UK Limited. Website and Platform Privacy Policy

Plus500UK Limited. Website and Platform Privacy Policy Plus500UK Limited Website and Platform Privacy Policy Website and Platform Privacy Policy Your privacy and trust are important to us and this Privacy Statement (Statement) provides important information

More information

1 About GfK and the Survey What are personal data? Use of personal data How we share personal data... 3

1 About GfK and the Survey What are personal data? Use of personal data How we share personal data... 3 Privacy Notice For ad-hoc CAWI (without target list) V1.0 June 4, 2018 Contents 1 About GfK and the Survey... 2 2 What are personal data?... 2 3 Use of personal data... 2 4 How we share personal data...

More information

Xpress Super may collect and hold the following personal information about you: contact details including addresses and phone numbers;

Xpress Super may collect and hold the following personal information about you: contact details including addresses and phone numbers; 65 Gilbert Street, Adelaide SA 5000 Tel: 1300 216 890 Fax: 08 8221 6552 Australian Financial Services Licence: 430962 Privacy Policy This Privacy Policy was last updated on 27 February 2017. Our Commitment

More information

Privacy Notice - General Data Protection Regulation ( GDPR )

Privacy Notice - General Data Protection Regulation ( GDPR ) THIS PRIVACY NOTICE APPLIES TO ANY PERSON WHO INSTRUCTS AN INDIVIDUAL BARRISTER AT 12 OLD SQUARE CHAMBERS EITHER DIRECTLY OR THROUGH A SOLICITOR OR WHO ASKS THE INDIVIDUAL BARRISTER FOR A REFERENCE Privacy

More information

VISTRA ZURICH AG - PRIVACY NOTICE

VISTRA ZURICH AG - PRIVACY NOTICE Effective Date: from 25 May 2018 VISTRA ZURICH AG - PRIVACY NOTICE This Privacy Notice explains how particular companies in the Vistra Group collect, use and disclose your personal data, and your rights

More information

MBNL Landlord Privacy Notice. This notice sets out how we handle landlord personal data as part of our General Data Protection policies (GDPR).

MBNL Landlord Privacy Notice. This notice sets out how we handle landlord personal data as part of our General Data Protection policies (GDPR). MBNL Landlord Privacy Notice This notice sets out how we handle landlord personal data as part of our General Data Protection policies (GDPR). SUMMARY This Privacy Notice applies to: users of our website

More information

VISTRA MONACO PRIVACY NOTICE

VISTRA MONACO PRIVACY NOTICE Effective Date: from 25 May 2018 VISTRA MONACO PRIVACY NOTICE This Privacy Notice explains how particular companies in the Vistra Group collect, use and disclose your personal data, and your rights in

More information

By accessing your Congressional Federal Credit Union account(s) electronically with the use of Online Banking through a personal computer or any other

By accessing your Congressional Federal Credit Union account(s) electronically with the use of Online Banking through a personal computer or any other CONGRESSIONAL FEDERAL CREDIT UNION ELECTRONIC CORRESPONDENCE DISCLOSURE & AGREEMENT Please read this information carefully and print a copy and/or retain this information electronically for your records.

More information

VISTRA NETHERLANDS PRIVACY NOTICE

VISTRA NETHERLANDS PRIVACY NOTICE Effective Date: from 25 May 2018 VISTRA NETHERLANDS PRIVACY NOTICE This Privacy Notice explains how particular companies in the Vistra Group collect, use and disclose your personal data, and your rights

More information

EIT Health UK-Ireland Privacy Policy

EIT Health UK-Ireland Privacy Policy EIT Health UK-Ireland Privacy Policy This policy describes how EIT Health UK-Ireland uses your personal information, how we protect your privacy, and your rights regarding your information. We promise

More information

PRIVACY NOTICE VOLUNTEER INFORMATION. Liverpool Women s NHS Foundation Trust

PRIVACY NOTICE VOLUNTEER INFORMATION. Liverpool Women s NHS Foundation Trust PRIVACY NOTICE VOLUNTEER INFORMATION Liverpool Women s NHS Foundation Trust Introduction This document summarises who we are, what information we hold about you, what we will do with the information we

More information

Subject: Kier Group plc Data Protection Policy

Subject: Kier Group plc Data Protection Policy Kier Group plc Data Protection Policy Subject: Kier Group plc Data Protection Policy Author: Compliance Document type: Policy Authorised by: Kier General Counsel & Company Secretary Version 3 Effective

More information

PORTICO PRIVACY NOTICE

PORTICO PRIVACY NOTICE PORTICO PRIVACY NOTICE Portico is committed to protecting and respecting your privacy. We take your privacy very seriously and we ask that you read this Privacy Notice carefully as it contains important

More information

Schedule Identity Services

Schedule Identity Services This document (this Schedule") is the Schedule for Services related to the identity management ( Identity Services ) made pursuant to the ehealth Ontario Services Agreement (the Agreement ) between ehealth

More information

PRIVACY POLICY. 1. Introduction

PRIVACY POLICY. 1. Introduction PRIVACY POLICY 1. Introduction 1.1. The Pinewood Studios Group is committed to protecting and respecting your privacy. This privacy policy (together with our Website Terms of Use and Cookies Policy) (Privacy

More information

Privacy Policy. Full name and contact details (including your contact number, and postal address).

Privacy Policy. Full name and contact details (including your contact number,  and postal address). 01326 270212 sales@htiddy.co.uk www.htiddy.co.uk Privacy Policy This privacy notice sets out how we will process personal data we collect from or about you, or which you provide to us. Please read this

More information

Use of Personal Mobile Phone Whilst on Duty

Use of Personal Mobile Phone Whilst on Duty Use of Personal Mobile Phone Whilst on Duty (Incorporating Smartphones and Hand Held Devices) Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland

More information

Protecting your Privacy Winchester Cathedral Privacy Notice

Protecting your Privacy Winchester Cathedral Privacy Notice Protecting your Privacy Cathedral Privacy Notice Introduction Cathedral is committed to protecting the privacy of any personal information it may hold regarding individuals. This Privacy Note explains

More information

Project Better Energy Limited s registered office is Witan Gate House, Witan Gate West, Milton Keynes, Buckinghamshire, MK9 1SH

Project Better Energy Limited s registered office is Witan Gate House, Witan Gate West, Milton Keynes, Buckinghamshire, MK9 1SH PRIVACY NOTICE Curv360 is a part of the Project Better Energy Limited group of companies and is a controller of any personal data you provide. We respect your data and your privacy is important to us.

More information

GDPR AMC SAAS AND HOSTED MODULES. UK version. AMC Consult A/S June 26, 2018 Version 1.10

GDPR AMC SAAS AND HOSTED MODULES. UK version. AMC Consult A/S June 26, 2018 Version 1.10 GDPR AMC SAAS AND HOSTED MODULES UK version AMC Consult A/S June 26, 2018 Version 1.10 INDEX 1 Signatures...3 2 General...4 3 Definitions...5 4 Scoping...6 4.1 In scope...6 5 Responsibilities of the data

More information

At Electronics Watch, we re committed to protecting and respecting your privacy

At Electronics Watch, we re committed to protecting and respecting your privacy Privacy Policy At Electronics Watch, we re committed to protecting and respecting your privacy This Policy sets out our data collection and processing practices, the conditions under which we may disclose

More information

EDENRED COMMUTER BENEFITS SOLUTIONS, LLC PRIVACY POLICY. Updated: April 2017

EDENRED COMMUTER BENEFITS SOLUTIONS, LLC PRIVACY POLICY. Updated: April 2017 This Privacy Policy (this Privacy Policy ) applies to Edenred Commuter Benefits Solutions, LLC, (the Company ) online interface (i.e., website or mobile application) and any Edenred Commuter Benefit Solutions,

More information

Google Cloud & the General Data Protection Regulation (GDPR)

Google Cloud & the General Data Protection Regulation (GDPR) Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to

More information

1. Muscat & Co Mortgage Solutions Ltd - Privacy Notice

1. Muscat & Co Mortgage Solutions Ltd - Privacy Notice 1. This Muscat & Co Mortgage Solutions Ltd privacy notice provides information on how we and any of our subsidiaries, and any 3 rd party providers collect, use, secure, transfer and share your information.

More information

DCCVITAL GDPR Privacy Statement. This privacy statement sets out

DCCVITAL GDPR Privacy Statement. This privacy statement sets out DCCVITAL GDPR Privacy Statement This privacy statement sets out what information DCCVITAL collects from you and why; how DCCVITAL uses and protects any information that you give; and how you can access

More information

INNOVENT LEASING LIMITED. Privacy Notice

INNOVENT LEASING LIMITED. Privacy Notice INNOVENT LEASING LIMITED Privacy Notice Table of Contents Topic Page number KEY SUMMARY 2 ABOUT US AND THIS NOTICE 3 USEFUL WORDS AND PHRASES 4 WHAT INFORMATION DO WE COLLECT? 4 WHY DO WE PROCESS YOUR

More information

Privacy Notice. Privacy Policy V2.0 1

Privacy Notice. Privacy Policy V2.0 1 Privacy Notice Privacy Policy V2.0 1 Contents Introduction... 3 About us... 3 How will we collect your personal information?... 4 What will we use your personal information for?... 5 Profiling and Automated

More information

HBW LAW LTD T/A HESELTINE BRAY & WELSH

HBW LAW LTD T/A HESELTINE BRAY & WELSH HBW LAW LTD T/A HESELTINE BRAY & WELSH CLIENT INFORMATION POLICY HOW WE STORE AND USE YOUR PERSONAL INFORMATION INFORMATION WE COLLECT AND HOLD ABOUT YOU To enable us to provide you with our services we

More information

TIA. Privacy Policy and Cookie Policy 5/25/18

TIA. Privacy Policy and Cookie Policy 5/25/18 TIA Privacy Policy and Cookie Policy 5/25/18 Background: TIA understands that your privacy is important to you and that you care about how your information is used and shared online. We respect and value

More information

HF Markets SA (Pty) Ltd Protection of Personal Information Policy

HF Markets SA (Pty) Ltd Protection of Personal Information Policy Protection of Personal Information Policy Protection of Personal Information Policy This privacy statement covers the website www.hotforex.co.za, and all its related subdomains that are registered and

More information

DLB Privacy Policy. Why we require your information

DLB Privacy Policy. Why we require your information At Etive Technologies Limited (Etive) which operates Digital Log Book, (DLB). We are committed to protecting the privacy of our customers and the responsible management of personal information in accordance

More information

Privacy and Spam Policy Ten Tigers Grain Marketing Pty Ltd

Privacy and Spam Policy Ten Tigers Grain Marketing Pty Ltd Privacy and Spam Policy Ten Tigers Grain Marketing Pty Ltd Our Commitment Ten Tigers Grain Marketing Pty Ltd and Ten Tigers Pty Ltd are committed to providing you with the highest levels of client service.

More information

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2 COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September 2018 Table of Contents 1. Scope, Purpose and Application to Employees 2 2. Reference Documents 2 3. Definitions 3 4. Data Protection Principles

More information

This Policy has been prepared with due regard to the General Data Protection Regulation (EU Regulation 2016/679) ( GDPR ).

This Policy has been prepared with due regard to the General Data Protection Regulation (EU Regulation 2016/679) ( GDPR ). PRIVACY POLICY Data Protection Policy 1. Introduction This Data Protection Policy (this Policy ) sets out how Brital Foods Limited ( we, us, our ) handle the Personal Data we Process in the course of our

More information

Contributed by Djingov, Gouginski, Kyutchukov & Velichkov

Contributed by Djingov, Gouginski, Kyutchukov & Velichkov Contributed by Djingov, Gouginski, Kyutchukov & Velichkov General I Data Protection Laws National Legislation General data protection laws The Personal Data Protection Act implemented the Data Protection

More information

Part B of this Policy sets out the rights that all individuals have in relation to the collection and use of your personal information

Part B of this Policy sets out the rights that all individuals have in relation to the collection and use of your personal information Date: 15 Feb 2018 Issue No: 1 Page: 1 of 15 Site: UK Kingspan Insulation Limited ("Kingspan") has issued this Data Protection Policy for its customers. The term customer refers to those that receive a

More information

Blue Alligator Company Privacy Notice (Last updated 21 May 2018)

Blue Alligator Company Privacy Notice (Last updated 21 May 2018) Blue Alligator Company Privacy Notice (Last updated 21 May 2018) Who are we? Blue Alligator Company Limited (hereafter referred to as BAC ) is a company incorporated in England with company registration

More information

IAB Europe Transparency & Consent Framework Policies

IAB Europe Transparency & Consent Framework Policies IAB Europe Transparency & Consent Framework Policies This document lays out policies applicable to participants in the Transparency & Consent Framework ( Policies ). Participants may include publishers,

More information

Minimum Requirements For The Operation of Management System Certification Bodies

Minimum Requirements For The Operation of Management System Certification Bodies ETHIOPIAN NATIONAL ACCREDITATION OFFICE Minimum Requirements For The Operation of Management System Certification Bodies April 2011 Page 1 of 11 No. Content Page 1. Introduction 2 2. Scope 2 3. Definitions

More information

DATA PROTECTION & PRIVACY POLICY

DATA PROTECTION & PRIVACY POLICY East Midlands Central Station (EMCS) Limited (hereinafter known as the Company) is committed to protecting and respecting your privacy. This Policy has been written in for compliance with the General Data

More information